Secure Roaming of Key Association Scheme Providing Perfect Forward Secrecy in IEEE 802.16
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cui, Yonggang | - |
dc.contributor.author | Kim, Sangjin | - |
dc.contributor.author | Oh, Heekuck | - |
dc.date.accessioned | 2021-06-23T19:37:05Z | - |
dc.date.available | 2021-06-23T19:37:05Z | - |
dc.date.issued | 2007-10 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/43498 | - |
dc.description.abstract | To date, IEEE 802.16 WiMAX has been seen increasingly as a fairly promising technique for next wireless communication networks to provide broadband wireless access, to which has been paid more attention by more and more researchers. When it comes to communication schemes or protocols in wireless networks, security is worth being considered as a critical issue. Likewise, in IEEE 802.16, researchers proposed a lot of security schemes or protocols based on IEEE 802.16 standard. However, these proposed protocols still suffer from plenty of malicious attacks. In this paper, we describe and analyze the security issues of the authentication and key management protocols in WiMAX, which are very vulnerable to many attacks. Then we focus Xu, Matthews, and Huang proposed protocol, secure roaming of key association during handover. Although it settles the problem with re-launch the authentication and key management when an MSS roams into from one base station to the other base station, could not guarantee the forward secrecy and backward secrecy at all. So we may also propose a possible solution, secure roaming of key association scheme providing perfect forward secrecy, which adopts elliptic curve cryptography and offers faster computational efficiency than RSA public key algorithm. | - |
dc.format.extent | 6 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | ACM | - |
dc.title | Secure Roaming of Key Association Scheme Providing Perfect Forward Secrecy in IEEE 802.16 | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.scopusid | 2-s2.0-62849083278 | - |
dc.identifier.bibliographicCitation | The IASTED International Conference Communication Systems, Networks and Applications, pp 136 - 141 | - |
dc.citation.title | The IASTED International Conference Communication Systems, Networks and Applications | - |
dc.citation.startPage | 136 | - |
dc.citation.endPage | 141 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | other | - |
dc.subject.keywordAuthor | Authentication | - |
dc.subject.keywordAuthor | Ecc | - |
dc.subject.keywordAuthor | Key management | - |
dc.subject.keywordAuthor | Wimax | - |
dc.identifier.url | https://dl.acm.org/doi/10.5555/1650270.1650299 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.